Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15/11/2024, 18:28 UTC

General

  • Target

    d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe

  • Size

    737KB

  • MD5

    fd1d7ef6ea22a9adc1bbcda9dded5594

  • SHA1

    44c8c1c01b4eddfc8d997b8876d1d5d237d7578f

  • SHA256

    d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c

  • SHA512

    6dbb40a25239c91e8e303da93876d22d0a8323d2b53de8f0ddd121f88e097c8c3e71d91981315a4db11fca2f0b172a277ee926cb7e78794f59c11f8e3a539679

  • SSDEEP

    12288:rjKoRYU1YjyndWCbikvj7lEemhtcZa/TRNxjsa1WYEaIdH4:nKoWUr31xEemh6Za/NjBYtd4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe
    "C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe
      "C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe"
      2⤵
        PID:2684
      • C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe
        "C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe"
        2⤵
          PID:2860
        • C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe
          "C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe"
          2⤵
            PID:2828
          • C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe
            "C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe"
            2⤵
              PID:1076
            • C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe
              "C:\Users\Admin\AppData\Local\Temp\d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c.exe"
              2⤵
                PID:3024

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1852-0-0x000000007449E000-0x000000007449F000-memory.dmp

              Filesize

              4KB

            • memory/1852-1-0x00000000003D0000-0x000000000048E000-memory.dmp

              Filesize

              760KB

            • memory/1852-2-0x0000000074490000-0x0000000074B7E000-memory.dmp

              Filesize

              6.9MB

            • memory/1852-3-0x0000000000600000-0x000000000061E000-memory.dmp

              Filesize

              120KB

            • memory/1852-4-0x000000007449E000-0x000000007449F000-memory.dmp

              Filesize

              4KB

            • memory/1852-5-0x0000000074490000-0x0000000074B7E000-memory.dmp

              Filesize

              6.9MB

            • memory/1852-6-0x000000000A7A0000-0x000000000A808000-memory.dmp

              Filesize

              416KB

            • memory/1852-7-0x0000000074490000-0x0000000074B7E000-memory.dmp

              Filesize

              6.9MB

            We care about your privacy.

            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.